Loading…

A System Framework of Security Management in Enterprise Systems

After analysing the security conditions in current Enterprise Systems (ES), this paper proposes a systematic framework that is based on the Secure Sockets Layer Virtual Private Network (SSL‐VPN) for improving security management. This framework takes account of several key aspects such as channel st...

Full description

Saved in:
Bibliographic Details
Published in:Systems research and behavioral science 2013-05, Vol.30 (3), p.287-299
Main Authors: Wang, Feng, Ge, Baoshan, Zhang, Li, Chen, Yong, Xin, Yang, Li, Xiayuan
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c4014-79754b7bd412fbc4f1ed7b2075a94eea83aff139b0bacc561de57de0d3eb02483
cites cdi_FETCH-LOGICAL-c4014-79754b7bd412fbc4f1ed7b2075a94eea83aff139b0bacc561de57de0d3eb02483
container_end_page 299
container_issue 3
container_start_page 287
container_title Systems research and behavioral science
container_volume 30
creator Wang, Feng
Ge, Baoshan
Zhang, Li
Chen, Yong
Xin, Yang
Li, Xiayuan
description After analysing the security conditions in current Enterprise Systems (ES), this paper proposes a systematic framework that is based on the Secure Sockets Layer Virtual Private Network (SSL‐VPN) for improving security management. This framework takes account of several key aspects such as channel strategy, network pattern, workstation authentication, identity authentication, security workflow, etc. The proposed framework has the following advantages: low cost, high performance, easy to implement, and strong security control pattern. In addition, this paper proposes a dynamic security strategy that is about authorizing user ID and roles dynamically and conducting real‐time mapping via agent or proxy technologies. Copyright © 2013 John Wiley & Sons, Ltd.
doi_str_mv 10.1002/sres.2184
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1418130541</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1418130541</sourcerecordid><originalsourceid>FETCH-LOGICAL-c4014-79754b7bd412fbc4f1ed7b2075a94eea83aff139b0bacc561de57de0d3eb02483</originalsourceid><addsrcrecordid>eNqFkMFKw0AQQIMoWKsH_yDgRQ9pZ7K73eYkRdoqVAWjFrwsm2QiaZuk7qbU_r1bWzwI4mGZPbw3MM_zzhE6CBB2rSHbCbHPD7wWQhQFKDk7_P6HgYSwd-ydWDsDQEDElnc98OONbaj0R0aXtK7N3K9zP6Z0ZYpm49_rSr9TSVXjF5U_rBoyS1NY2lv21DvK9cLS2X62vZfR8PnmNpg8ju9uBpMg5YA8kJEUPJFJxjHMk5TnSJlMQpBCR5xI95nOc2RRAolOU9HDjITMCDJGCYS8z9re5W7v0tQfK7KNKgub0mKhK6pXViHHPjIQHP9HmQx77glw6MUvdFavTOUOcZSQACwSwlFXOyo1tXWBc-USlNpsFILaVlfb6mpb3bHdHbsuFrT5G1Tx0zDeG8HOKFzQzx9Dm7nqSSaFmj6MVRS_Ttn0baxG7AuMSJJR</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1357003955</pqid></control><display><type>article</type><title>A System Framework of Security Management in Enterprise Systems</title><source>International Bibliography of the Social Sciences (IBSS)</source><source>Wiley-Blackwell Read &amp; Publish Collection</source><source>Business Source Ultimate (EBSCOHost)</source><creator>Wang, Feng ; Ge, Baoshan ; Zhang, Li ; Chen, Yong ; Xin, Yang ; Li, Xiayuan</creator><creatorcontrib>Wang, Feng ; Ge, Baoshan ; Zhang, Li ; Chen, Yong ; Xin, Yang ; Li, Xiayuan</creatorcontrib><description>After analysing the security conditions in current Enterprise Systems (ES), this paper proposes a systematic framework that is based on the Secure Sockets Layer Virtual Private Network (SSL‐VPN) for improving security management. This framework takes account of several key aspects such as channel strategy, network pattern, workstation authentication, identity authentication, security workflow, etc. The proposed framework has the following advantages: low cost, high performance, easy to implement, and strong security control pattern. In addition, this paper proposes a dynamic security strategy that is about authorizing user ID and roles dynamically and conducting real‐time mapping via agent or proxy technologies. Copyright © 2013 John Wiley &amp; Sons, Ltd.</description><identifier>ISSN: 1092-7026</identifier><identifier>EISSN: 1099-1743</identifier><identifier>DOI: 10.1002/sres.2184</identifier><language>eng</language><publisher>Chichester: Blackwell Publishing Ltd</publisher><subject>Agents (artificial intelligence) ; Authentication ; Authentication protocols ; Channels ; Computer equipment ; Computer science ; enterprise systems ; ERP ; Identification ; identity authentication ; Internet security ; Management ; network security pattern ; Networks ; Secure Sockets Layer protocol ; Security ; Security management ; Sockets ; Strategy ; Studies ; system security management ; Technology ; Virtual private networks ; Work place</subject><ispartof>Systems research and behavioral science, 2013-05, Vol.30 (3), p.287-299</ispartof><rights>Copyright © 2013 John Wiley &amp; Sons, Ltd.</rights><rights>Copyright Wiley Periodicals Inc. May/Jun 2013</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c4014-79754b7bd412fbc4f1ed7b2075a94eea83aff139b0bacc561de57de0d3eb02483</citedby><cites>FETCH-LOGICAL-c4014-79754b7bd412fbc4f1ed7b2075a94eea83aff139b0bacc561de57de0d3eb02483</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902,33200,33201</link.rule.ids></links><search><creatorcontrib>Wang, Feng</creatorcontrib><creatorcontrib>Ge, Baoshan</creatorcontrib><creatorcontrib>Zhang, Li</creatorcontrib><creatorcontrib>Chen, Yong</creatorcontrib><creatorcontrib>Xin, Yang</creatorcontrib><creatorcontrib>Li, Xiayuan</creatorcontrib><title>A System Framework of Security Management in Enterprise Systems</title><title>Systems research and behavioral science</title><addtitle>Syst. Res</addtitle><description>After analysing the security conditions in current Enterprise Systems (ES), this paper proposes a systematic framework that is based on the Secure Sockets Layer Virtual Private Network (SSL‐VPN) for improving security management. This framework takes account of several key aspects such as channel strategy, network pattern, workstation authentication, identity authentication, security workflow, etc. The proposed framework has the following advantages: low cost, high performance, easy to implement, and strong security control pattern. In addition, this paper proposes a dynamic security strategy that is about authorizing user ID and roles dynamically and conducting real‐time mapping via agent or proxy technologies. Copyright © 2013 John Wiley &amp; Sons, Ltd.</description><subject>Agents (artificial intelligence)</subject><subject>Authentication</subject><subject>Authentication protocols</subject><subject>Channels</subject><subject>Computer equipment</subject><subject>Computer science</subject><subject>enterprise systems</subject><subject>ERP</subject><subject>Identification</subject><subject>identity authentication</subject><subject>Internet security</subject><subject>Management</subject><subject>network security pattern</subject><subject>Networks</subject><subject>Secure Sockets Layer protocol</subject><subject>Security</subject><subject>Security management</subject><subject>Sockets</subject><subject>Strategy</subject><subject>Studies</subject><subject>system security management</subject><subject>Technology</subject><subject>Virtual private networks</subject><subject>Work place</subject><issn>1092-7026</issn><issn>1099-1743</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><sourceid>8BJ</sourceid><recordid>eNqFkMFKw0AQQIMoWKsH_yDgRQ9pZ7K73eYkRdoqVAWjFrwsm2QiaZuk7qbU_r1bWzwI4mGZPbw3MM_zzhE6CBB2rSHbCbHPD7wWQhQFKDk7_P6HgYSwd-ydWDsDQEDElnc98OONbaj0R0aXtK7N3K9zP6Z0ZYpm49_rSr9TSVXjF5U_rBoyS1NY2lv21DvK9cLS2X62vZfR8PnmNpg8ju9uBpMg5YA8kJEUPJFJxjHMk5TnSJlMQpBCR5xI95nOc2RRAolOU9HDjITMCDJGCYS8z9re5W7v0tQfK7KNKgub0mKhK6pXViHHPjIQHP9HmQx77glw6MUvdFavTOUOcZSQACwSwlFXOyo1tXWBc-USlNpsFILaVlfb6mpb3bHdHbsuFrT5G1Tx0zDeG8HOKFzQzx9Dm7nqSSaFmj6MVRS_Ttn0baxG7AuMSJJR</recordid><startdate>201305</startdate><enddate>201305</enddate><creator>Wang, Feng</creator><creator>Ge, Baoshan</creator><creator>Zhang, Li</creator><creator>Chen, Yong</creator><creator>Xin, Yang</creator><creator>Li, Xiayuan</creator><general>Blackwell Publishing Ltd</general><general>Wiley Periodicals Inc</general><scope>BSCLL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8BJ</scope><scope>8FD</scope><scope>FQK</scope><scope>JBE</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201305</creationdate><title>A System Framework of Security Management in Enterprise Systems</title><author>Wang, Feng ; Ge, Baoshan ; Zhang, Li ; Chen, Yong ; Xin, Yang ; Li, Xiayuan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c4014-79754b7bd412fbc4f1ed7b2075a94eea83aff139b0bacc561de57de0d3eb02483</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Agents (artificial intelligence)</topic><topic>Authentication</topic><topic>Authentication protocols</topic><topic>Channels</topic><topic>Computer equipment</topic><topic>Computer science</topic><topic>enterprise systems</topic><topic>ERP</topic><topic>Identification</topic><topic>identity authentication</topic><topic>Internet security</topic><topic>Management</topic><topic>network security pattern</topic><topic>Networks</topic><topic>Secure Sockets Layer protocol</topic><topic>Security</topic><topic>Security management</topic><topic>Sockets</topic><topic>Strategy</topic><topic>Studies</topic><topic>system security management</topic><topic>Technology</topic><topic>Virtual private networks</topic><topic>Work place</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wang, Feng</creatorcontrib><creatorcontrib>Ge, Baoshan</creatorcontrib><creatorcontrib>Zhang, Li</creatorcontrib><creatorcontrib>Chen, Yong</creatorcontrib><creatorcontrib>Xin, Yang</creatorcontrib><creatorcontrib>Li, Xiayuan</creatorcontrib><collection>Istex</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>International Bibliography of the Social Sciences (IBSS)</collection><collection>Technology Research Database</collection><collection>International Bibliography of the Social Sciences</collection><collection>International Bibliography of the Social Sciences</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Systems research and behavioral science</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wang, Feng</au><au>Ge, Baoshan</au><au>Zhang, Li</au><au>Chen, Yong</au><au>Xin, Yang</au><au>Li, Xiayuan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A System Framework of Security Management in Enterprise Systems</atitle><jtitle>Systems research and behavioral science</jtitle><addtitle>Syst. Res</addtitle><date>2013-05</date><risdate>2013</risdate><volume>30</volume><issue>3</issue><spage>287</spage><epage>299</epage><pages>287-299</pages><issn>1092-7026</issn><eissn>1099-1743</eissn><abstract>After analysing the security conditions in current Enterprise Systems (ES), this paper proposes a systematic framework that is based on the Secure Sockets Layer Virtual Private Network (SSL‐VPN) for improving security management. This framework takes account of several key aspects such as channel strategy, network pattern, workstation authentication, identity authentication, security workflow, etc. The proposed framework has the following advantages: low cost, high performance, easy to implement, and strong security control pattern. In addition, this paper proposes a dynamic security strategy that is about authorizing user ID and roles dynamically and conducting real‐time mapping via agent or proxy technologies. Copyright © 2013 John Wiley &amp; Sons, Ltd.</abstract><cop>Chichester</cop><pub>Blackwell Publishing Ltd</pub><doi>10.1002/sres.2184</doi><tpages>13</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1092-7026
ispartof Systems research and behavioral science, 2013-05, Vol.30 (3), p.287-299
issn 1092-7026
1099-1743
language eng
recordid cdi_proquest_miscellaneous_1418130541
source International Bibliography of the Social Sciences (IBSS); Wiley-Blackwell Read & Publish Collection; Business Source Ultimate (EBSCOHost)
subjects Agents (artificial intelligence)
Authentication
Authentication protocols
Channels
Computer equipment
Computer science
enterprise systems
ERP
Identification
identity authentication
Internet security
Management
network security pattern
Networks
Secure Sockets Layer protocol
Security
Security management
Sockets
Strategy
Studies
system security management
Technology
Virtual private networks
Work place
title A System Framework of Security Management in Enterprise Systems
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T15%3A29%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20System%20Framework%20of%20Security%20Management%20in%20Enterprise%20Systems&rft.jtitle=Systems%20research%20and%20behavioral%20science&rft.au=Wang,%20Feng&rft.date=2013-05&rft.volume=30&rft.issue=3&rft.spage=287&rft.epage=299&rft.pages=287-299&rft.issn=1092-7026&rft.eissn=1099-1743&rft_id=info:doi/10.1002/sres.2184&rft_dat=%3Cproquest_cross%3E1418130541%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c4014-79754b7bd412fbc4f1ed7b2075a94eea83aff139b0bacc561de57de0d3eb02483%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1357003955&rft_id=info:pmid/&rfr_iscdi=true